A machine or program designed to inspect a wireless environment, detect all computers and systems using wireless technology, and analyze them to identify what types of wireless they are using, and how they are set up.
A network device (a 'box') that lets users connect to the network via wireless (i.e. without using a cable). They usually, but not always, have small antennas, and THEY are attached to the network via a cable.
Commonly called 'WPA'. A way of encrypting wireless network traffic so that it cannot be read or changed by attackers. It is a newer, better, replacement for WEP.
The secret numbers or letters used in WEP encryption to (hopefully) keep wireless communications private.
Wired Equivalent Privacy. An encryption protocol for wireless network traffic. It is an old system that is very simple, but does NOT work very well. Avoid it if possible, by using newer, better systems like WPA or 802.11i.
A computer used to display web pages.
Web hosting is a service that provides a physical location in which a web site resides. Customers' websites are stored on computer servers located in environments permanently connected to the Internet through high-speed data lines.
A scan of a given network by another computer to identify any weaknesses in any computer security systems.
Virtual Private Network. A way of using encryption to make sure that your communications back to a computer are private, even over a public network.
A program capable of detecting, blocking, and/or removing various forms of malicious code or malware such as viruses, worms, spyware, and Trojans.